Apple quietly announced today it is working on a tool to detect and remove the Flashback malware currently infecting hundreds of thousands of Mac computers around the world.
"In addition to the Java vulnerability, the Flashback malware relies on computer servers hosted by the malware authors to perform many of its critical functions," Apple wrote on its Web site. "Apple is working with ISPs worldwide to disable this command and control network."
Apple did not indicate when it expected the tool to be released to the public, and a company spokesman could not provide an estimate.
The malware made headlines last week when a Russian antivirus company revealed thatwith the malware, which is designed to steal personal information. The masquerading as a fake Adobe Flash Player plug-in installer, but in the past few months it has evolved to exploit Java vulnerabilities that went unpatched in Mac systems.
Several experts have since said that the infectionto target Apple's Mac platform, which has grown in recent years alongside the popularity of the company's mobile devices.
Anti-malware makers have made efforts to build detection and removal tools for Flashback into their products, though one of the most readily available methods has been a manual process that involves plugging code strings into a built-in system utility. For its part, Applefor OS X 10.6 and 10.7 that brings Java up-to-date and patches these vulnerabilities to keep computers from being infected in the first place.
[Via The Loop]
CNET staff writer Josh Lowensohn contributed to this report.
All the latest Apple news, featuring developments on the iPhone, iPad, Macbooks, OS X and much more.
Dec 2NYPD busts $8 million counterfeit phone scheme
Dec 2Apple factory manager indicted for stealing thousands of iPhones
Dec 2CNET UK podcast 508: Nokia's return and an all-night cat rave
Dec 1Apple is testing more than 10 different prototypes of the iPhone 8